Advertisement

A Location Spoofing Detection Method for Social Networks (Short Paper)

  • Chaoping Ding
  • Ting Wu
  • Tong Qiao
  • Ning Zheng
  • Ming XuEmail author
  • Yiming Wu
  • Wenjing Xia
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 268)

Abstract

It is well known that check-in data from location-based social networks (LBSN) can be used to predict human movement. However, there are large discrepancies between check-in data and actual user mobility, because users can easily spoof their location in LBSN. The act of location spoofing refers to intentionally making false location, leading to a negative impact both on the credibility of location-based social networks and the reliability of spatial-temporal data. In this paper, a location spoofing detection method in social networks is proposed. First, Latent Dirichlet Allocation (LDA) model is used to learn the topics of users by mining user-generated microblog information, based on this a similarity matrix associated with the venue is calculated. And the venue visiting probability is computed based on user historical check-in data by using Bayes model. Then, the similarity value and visiting probability is combined to quantize the probability of location spoofing. Experiments on a large scale and real-world LBSN dataset collected from Weibo show that the proposed approach can effectively detect certain types of location spoofing.

Keywords

Location spoofing Social networks Semantic analysis 

Notes

Acknowledgment

This work is supported by the cyberspace security Major Program in National Key Research and Development Plan of China under grant 2016YFB0800201, Natural Science Foundation of China under grants 61572165 and 61702150, State Key Program of Zhejiang Province Natural Science Foundation of China under grant LZ15F020003, Key Research and Development Plan Project of Zhejiang Province under grants 2017C01062 and 2017C01065, and the Scientific Research fund of Zhejiang Provincial Education Department under grant Y201737924, and Zhejiang Provincial Natural Science Foundation of China under Grant No. LGG18F020015.

References

  1. 1.
    Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., Zimmerman, J.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011)Google Scholar
  2. 2.
    Patil, S., Norcie, G., Kapadia, A., Lee, A.: Check out where i am!: location-sharing motivations, preferences, and practices. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1997–2002. ACM (2012)Google Scholar
  3. 3.
    He, W., Liu, X., Ren, M.: Location cheating: a security challenge to location-based social network services. In: 2011 31st International Conference on Distributed computing systems (ICDCS), pp. 740–749. IEEE (2011)Google Scholar
  4. 4.
    Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. IEEE (2012)Google Scholar
  5. 5.
    Polakis, I., Volanis, S., Athanasopoulos, E., Markatos, E.P.: The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 19–28. ACM (2013)Google Scholar
  6. 6.
    Zhang, Z., et al.: On the validity of geosocial mobility traces. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 11. ACM (2013)Google Scholar
  7. 7.
    Wang, G., Schoenebeck, S.Y., Zheng, H., Zhao, B.Y.: “Will check-in for badges”: understanding bias and misbehavior on location-based social networks. In: ICWSM, pp. 417–426 (2016)Google Scholar
  8. 8.
    Papalexakis, E., Pelechrinis, K., Faloutsos, C.: Spotting misbehaviors in location-based social networks using tensors. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 551–552. ACM (2014)Google Scholar
  9. 9.
    Zhao, B., Sui, D.Z.: True lies in geospatial big data: detecting location spoofing in social media. Ann. GIS 23(1), 1–14 (2017)CrossRefGoogle Scholar
  10. 10.
    Lin, J.: Divergence measures based on the Shannon entropy. IEEE Trans. Inf. Theory 37, 145–151 (1991)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)zbMATHGoogle Scholar
  12. 12.
    Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Nat. Acad. Sci. 101(suppl 1), 5228–5235 (2004)CrossRefGoogle Scholar
  13. 13.
    Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722 (2014)

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Chaoping Ding
    • 1
  • Ting Wu
    • 2
  • Tong Qiao
    • 2
  • Ning Zheng
    • 1
    • 2
  • Ming Xu
    • 1
    • 2
    Email author
  • Yiming Wu
    • 2
  • Wenjing Xia
    • 1
  1. 1.Internet and Network Security Laboratory, School of Computer Science and TechnologyHangzhou Dianzi UniversityHangzhouChina
  2. 2.School of CyberspaceHangzhou Dianzi UniversityHangzhouChina

Personalised recommendations